-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2014.0410.3
                         mediawiki security update
                               7 April 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mediawiki, mediawiki-extensions
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Reduced Security                -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-2665 CVE-2014-1610 CVE-2013-6472
                   CVE-2013-6454 CVE-2013-6453 CVE-2013-6452
                   CVE-2013-4572 CVE-2013-4568 CVE-2013-4567
                   CVE-2013-2031  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2891

Revision History:  April  7 2014: The Mediawiki update issued as DSA 2891-1 
				  caused regressions. This update fixes those 
				  problems.
                   April  1 2014: In the Mediawiki update issued as DSA 2891-1, 
				  a few files were missing from the package.
                   March 31 2014: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2891-3                   security@debian.org
http://www.debian.org/security/                           Thijs Kinkhorst
March 31, 2014                         http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : mediawiki, mediawiki-extensions
CVE ID         : CVE-2013-2031 CVE-2013-4567 CVE-2013-4568 CVE-2013-4572 
                 CVE-2013-6452 CVE-2013-6453 CVE-2013-6454 CVE-2013-6472
                 CVE-2014-1610 CVE-2014-2665
Debian Bug     : 729629 706601 742857 742857

The Mediawiki update issued as DSA 2891-1 caused regressions. This
update fixes those problems. For reference the original advisory
text follows.

Several vulnerabilities were discovered in MediaWiki, a wiki engine.
The Common Vulnerabilities and Exposures project describers the followin
issues:

CVE-2013-2031

    Cross-site scripting attack via valid UTF-7 encoded sequences
    in a SVG file.

CVE-2013-4567 & CVE-2013-4568

    Kevin Israel (Wikipedia user PleaseStand) reported two ways
    to inject Javascript due to an incomplete blacklist in the
    CSS sanitizer function.

CVE-2013-4572

    MediaWiki and the CentralNotice extension were incorrectly setting
    cache headers when a user was autocreated, causing the user's
    session cookies to be cached, and returned to other users.

CVE-2013-6452

    Chris from RationalWiki reported that SVG files could be
    uploaded that include external stylesheets, which could lead to
    XSS when an XSL was used to include JavaScript.

CVE-2013-6453

    MediaWiki's SVG sanitization could be bypassed when the XML was
    considered invalid.

CVE-2013-6454

    MediaWiki's CSS sanitization did not filter -o-link attributes,
    which could be used to execute JavaScript in Opera 12.

CVE-2013-6472

    MediaWiki displayed some information about deleted pages in
    the log API, enhanced RecentChanges, and user watchlists.

CVE-2014-1610

    A remote code execution vulnerability existed if file upload
    support for DjVu (natively handled) or PDF files (in
    combination with the PdfHandler extension) was enabled.
    Neither file type is enabled by default in MediaWiki.

CVE-2014-2665

    Cross site request forgery in login form: an attacker could login
    a victim as the attacker.

For the stable distribution (wheezy), these problems have been fixed in
version 1.19.15+dfsg-0+deb7u1 of the mediawiki package and 3.5~deb7u2
of the mediawiki-extensions package.

For the unstable distribution (sid), these problems have been fixed in
version 1:1.19.15+dfsg-1 of the mediawiki package and 3.5 of the
mediawiki-extensions package.

We recommend that you upgrade your mediawiki packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTPvFEAAoJEFb2GnlAHawEUnQIAJO3DNdwEB8tFxUuHHgiDhca
aflYKW0dCOhosykIi5hmoiw94ejQwW7sciDvhA2x0xoyQnnVtexMzgK9TWcVOXKx
pRP+y/XAekv35XNdgg9zNVh6xK7PZW9LTjjbWhf95oZAZE7y9cFmIWjdJmqlmBc/
yWXvjf8b46M4I14V9IkVNOBVWhu2boVnLQnFSr50mToBAF2OPd3zNfRMgEEhDmjn
6qriOXC7LU8CZ+hkqxYGhjn5mPqvRsC/lSLCojji36Ipo4/rLp7pAhNsmfRaajcg
rpYXM9q6XFM6bMmOyNBelfKtOkU/spotyrXQzoRaE3RPMDy97Ulej5BiCyxtJF4=
=vPNv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=2hmw
-----END PGP SIGNATURE-----